:: ±âÇÑÁ¦ ȨÆäÀÌÁö¿¡ ¿À½Å°ÍÀ» ȯ¿µÇÕ´Ï´Ù.::
 
 
Àαâ°Ë»ö¾î : ±³¾ç    ÄÄÇ»ÅÍ    Àü±âÀüÀÚ    Á¤º¸Åë½Å    ±â°èÀÚµ¿Â÷    
µµ¼­°Ë»ö   
 
  ±³¾ç
  ÄÄÇ»ÅÍ
  Àü±âÀüÀÚ
  Á¤º¸Åë½Å
  ±â°èÀÚµ¿Â÷
  ¼öÇè¼­/ÀÚ°ÝÁõ
  ±âŸµµ¼­
  µµ¼­ÃâÆÇ Ã¥¸¶·ç
 
 

 
ÀÛ¼ºÀÏ : 18-02-21 09:57
 ³×Æ®¿öÅ© º¸¾È
¹ÚÁ¾¹Î, ±èÁ¦±¹
2019³â 8¿ù 30ÀÏ
4*6
268
978-89-7018-784-6
18,000¿ø


..
Á¦1Àå ³×Æ®¿öÅ© ÀϹÝ
1.1 ³×Æ®¿öÅ© °³³ä
1.2 OSI 7 Layer
1.3 TCP/IP ÀϹÝ
1.4 ÇÁ·ÎÅäÄÝÀÇ ¿ø¸® ¹× ÀÌÇØ
1.5 Unix/Windows ³×Æ®¿öÅ© ¼­ºñ½º

Á¦2Àå ³×Æ®¿öÅ© È°¿ë
2.1 IP Routing
2.2 ³×Æ®¿öÅ© ÀåºñÀÇ ÀÌÇØ
2.3 ¹«¼± Åë½Å
2.4 ³×Æ®¿öÅ© ±â¹Ý ¸í·É¾î
2.5 ³×Æ®¿öÅ© ÆÐŶ ºÐ¼®ÀÇ ÀÌÇØ
2.6 ³×Æ®¿öÅ© Æ®·¯ºí½´ÆÃ

Á¦3Àå ³×Æ®¿öÅ© °ø°Ý ±â¼ú
3.1 ³×Æ®¿öÅ© º¸¾È °³¿ä
3.2 °ø°ÝÀÇ Á¾·ù
3.3 ¼­ºñ½º °ÅºÎ(Denial of Service) °ø°Ý
3.4 ³×Æ®¿öÅ© ½ºÄ³´×
3.5 IP Spoofing, Session Hijacking
3.6 ³×Æ®¿öÅ© ½º´ÏÇÎ

Á¦4Àå ħÀÔÂ÷´Ü ½Ã½ºÅÛ ±â¼ú
4.1 ħÀÔÂ÷´Ü ½Ã½ºÅÛ °³¿ä
4.2 ħÀÔÂ÷´Ü ½Ã½ºÅÛ À¯Çü
4.3 ħÀÔÂ÷´Ü ½Ã½ºÅÛ ±¸¼º
4.4 ¹ÙÀÌ·¯½º ¿ù(Virus wall)
4.5 ħÀÔ¹æÁö ½Ã½ºÅÛ(Intrusion Prevention System)

Á¦5Àå ħÀÔŽÁö ½Ã½ºÅÛ ±â¼ú
5.1 ħÀÔŽÁö ½Ã½ºÅÛ °³¿ä
5.2 ħÀÔŽÁö ½Ã½ºÅÛÀÇ ±â´É°ú ºÐ·ù

Á¦6Àå ³×Æ®¿öÅ© Àåºñ º¸¾È ±â¼ú
6.1 ¹æÈ­º®(Firewall) ½Ã½ºÅÛ
6.2 °¡»ó»ç¼³¸Á(VPN)ÀÇ ÀÌÇØ
6.3 ¶ó¿ìÅÍ º¸¾È

Á¦7Àå ³×Æ®¿öÅ© º¸¾È µ¿Çâ
7.1 ÃÖ±Ù ³×Æ®¿öÅ© ħÇØ»ç°íÀÇ ÀÌÇØ
7.2 ÃÖ±Ù ³×Æ®¿öÅ© º¸¾È ¼Ö·ç¼Ç